Volume-10 ~ Issue-2
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Data Security Model Enhancement In Cloud Environment |
| Country | : | India |
| Authors | : | Navia Jose, Clara Kanmani A |
| : | 10.9790/0661-01020106 ![]() |
Abstract: Cloud computing is one of the most emerging technologies which plays an important role in the next generation architecture of IT Enterprise. It has been widely accepted due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of the IT industry. In the cloud computing system, both application software and databases are moved to the large data centers, where the data should not be secure in the hands of providers. IT organizations have expressed concerns about the various security aspects that exist with the widespread implementation of cloud computing. These types of concerns originate from the fact that data is stored remotely from the customer's location. From the consumers' perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor for adoption of cloud computing services. This paper describes an enhancement for the already existing data security model in cloud environment. The proposed data security model provides user authentication and data protection. It also ensures fast recovery of data.
Keyword - AES Algorithm, Byzantine fault tolerance, Data Security Model, Distributed Denial of Service (DDoS)
[1] Peter Mell, and Tim Grance, The NIST Definition of CloudComputing,Version 15, 10-7-09
[2] Eman M.Mohamed and Hatem S. Abdelkader, Enhanced Data Security Model, The 8th International Conference on INFOrmatics and Systems (INFOS2012) - 14-16 May, Cloud and Mobile Computing Track, 2012
[3] Cloud computing security, http://en.wikipedia.org/wiki/Cloud_computing_security.
[4] ZhaoYong-Xia and Zhen Ge ,"MD5 Research," Second International Conference on Multimedia and Information Technology, 2010
[5] C. Almond, A Practical Guide to Cloud Computing Security,27 August 2009
[6] Aayush Chhabra and Srushti Mathur, Modified RSA Algorithm - A Secure Approach, 2011
[7] N. Mead, et ai, "Security quality requirements engineering (SQUARE) methodology," Carnegie Mellon Software Engineering
Institute.
[8] J. W.Rittinghouse and J. F.Ransome," Cloud Computing: Taylor and Francis Group," LLC, 2010.
[9] Lili Sun, Hua Wang, Xiaohui Tao,Yanchun Zhang and Jing Yang, "Privacy-Preserving Fine-Grained Access Control in Public Clouds, " 2011
[10] K. Cartrysse and J.C.A. van der Lubbe," The Advanced Encryption Standard: Rijndael," Supplement to the books"Basic methods
of cryptography" and"Basismethoden cryptografie", October 2004
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Service Based Content Sharing in the Environment of Mobile Ad-hoc Networks |
| Country | : | India |
| Authors | : | Hashmi Vallipalli, A.V.Praveen Krishna |
| : | 10.9790/0661-01020712 ![]() |
Abstract: The peer-to-peer network is the one of the traditional client server networking model. The file sharing on mobile devices is not easily achieved to the user for limited bandwidth and high cost. The irregular disconnection and IP address changes occur due to network migration. We holds the short range networking technologies as Bluetooth with no cost to the user and it is sufficiently fast to make file transfer very practical. A peer-to-peer model that permits efficient file sharing between mobile smartphones over a low-cost transport. Our paper results that peer-to-peer file transfer between todays mobile devices are practical. But the server limits must be applied on the transfers. These are unique to the mobile device environment. The upload-over-download ratio should be relatively low, due to higher current drain on transmit. Where the target file system is very slow then the larger file segments "Direct Memory Access" (DMA) mode can be utilized as different to "Program Input Output" (PIO) mode. The use of UDP for content sharing is more ideal than the use of OBEX. We will overcome some of the barriers to acceptance through our design approach. Peer discovery and content distribution occurs automatically without connection from the user. At last the transport is also implemented in the application layer and uses existing standard protocols without modification.
Keywords: Peer-to-peer network, Direct Memory Access, Program Input Output, mobile device environment, mobile smartphones, Bluetooth, network migration, mobile ad-hoc networks
[1] A. Oram, "Peer-to-Peer: Harnessing the Benefits of a Disruptive Technology". O'Reilly, 2001.
[2] K. Kant, "An analytic model for peer to peer file sharing networks," in IEEE International Conference on Communications, May 2003, pp. 1801 – 1805 vol. 3.
[3] A. Legout, G. Urvoy-Keller, and P. Michiardi, "Rarest First and Choke Algorithms Are Enough," in IMC'06, Rio de Janeiro, Brazil, 2006.
[4] Yang, X. et al, "Service capacity of peer to peer networks," in 23rd Joint Conference of IEEE Computer and Communications, 2004.
[5] Hu, T. H. et al, "Supporting mobile devices in Gnutella file sharing network with mobile agents," in 8th IEEE Int. Symposium on Computers and Communication, Sep. 2003, pp. 1035 – 1040 vol. 2.
[6] Dhurandher, S. K. et al, "A swarm intelligence-based p2p file sharing protocol using bee algorithm," in IEEE/ACS Int. Conf. on Computer Systems and Applications, 2009.
[7] Asadi, M. et al, "A scalable lookup service for p2p file sharing in manet," in Proc. of the 2007 Int. Conference on Wireless Comm. and Mobile Computing. New York, NY, USA: ACM, 2007.
[8] Huang, C.-M. et al, "A file discovery control scheme for P2P file sharing applications in wireless mobile environments," in Proc. of the 28th Australasian Conference on C.S., 2005.
[9] O. Ratsimor, D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service discovery in agent-based pervasive computing environments," Mob. Netw. Appl., vol. 9, no. 6, pp. 679–692, 2004.
[10] G. P. Perrucci and F. Fitzek, "Measurements campaign for energy consumption on mobile phones," Aalborg University, Tech. Rep., 2009..
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Analytics of Data Science using Big Data |
| Country | : | India |
| Authors | : | Ch. Sai Krishna Manohar |
| : | 10.9790/0661-01021921 ![]() |
Abstract: This paper will cover the concepts of Adoption trends of Big Data, needs of BIG DATA, benefits of Big Data and finally the summary, conclusion. My analysis illustrate that the fast-growing and a key enabler for the social business. The paper also discuss about the storing of the data as a Big Data. It deals with the servers that the Big Data is going to maintain at the backend. The insights gained from the user generated online contents and collaboration with customers is critical for customers are critical success in the age of social media.
Keywords – Data warehousing as-a-service (DAAS), Info Sphere Big Insight, Sand Analytic Program.
[1]. http://www-01.ibm.com/software/data/infosphere/biginsights/
[2]. https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&ved=0CD8QFjAC&url=http%3A%2F%2Fgslmug.files.wordpress.com%2F2012%2F02%2Fbig-data-presentation-made-at-the-utah-iseries-user-group-on-feb-82012.ppt&ei=jYI_UaSaJMrtrQe5sYGoCg&usg=AFQjCNE5YIz58c49BghBzJ4N8ZiZsd-hzQ&sig2=v4Qg-
[3]. www.acm.org
[4]. www.ieee.org
[5]. W.J. Book, Modelling design and control of flexible manipulator arms: A tutorial review, Proc. 29th IEEE Conf. on Decision and Control, San Francisco, CA, 1990, 500-506
